CN102770869B - 计算资源的安全执行 - Google Patents
计算资源的安全执行 Download PDFInfo
- Publication number
- CN102770869B CN102770869B CN201080064671.4A CN201080064671A CN102770869B CN 102770869 B CN102770869 B CN 102770869B CN 201080064671 A CN201080064671 A CN 201080064671A CN 102770869 B CN102770869 B CN 102770869B
- Authority
- CN
- China
- Prior art keywords
- computational resource
- descriptor
- systems
- secondary descriptor
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Advance Control (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/646,059 | 2009-12-23 | ||
| US12/646,059 US8782429B2 (en) | 2009-12-23 | 2009-12-23 | Securing execution of computational resources |
| PCT/US2010/061517 WO2011079112A1 (en) | 2009-12-23 | 2010-12-21 | Securing execution of computational resources |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102770869A CN102770869A (zh) | 2012-11-07 |
| CN102770869B true CN102770869B (zh) | 2015-11-25 |
Family
ID=43736874
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201080064671.4A Active CN102770869B (zh) | 2009-12-23 | 2010-12-21 | 计算资源的安全执行 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8782429B2 (enExample) |
| EP (1) | EP2517140B1 (enExample) |
| JP (1) | JP5797666B2 (enExample) |
| KR (2) | KR101643677B1 (enExample) |
| CN (1) | CN102770869B (enExample) |
| AU (1) | AU2010336503B2 (enExample) |
| CA (1) | CA2784896C (enExample) |
| WO (1) | WO2011079112A1 (enExample) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5988473B2 (ja) * | 2011-09-20 | 2016-09-07 | 株式会社Dnpハイパーテック | モジュールの暗号化/復号化プログラム |
| US9112851B2 (en) * | 2013-06-18 | 2015-08-18 | Sap Se | Integrating web protocols with applications and services |
| US9237006B2 (en) * | 2013-09-30 | 2016-01-12 | Protegrity Corporation | Table-connected tokenization |
| US10657262B1 (en) * | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
| EP3449451B8 (en) * | 2016-04-29 | 2022-09-14 | nChain Licensing AG | Implementing logic gate functionality using a blockchain |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1526429A2 (en) * | 2003-10-24 | 2005-04-27 | Microsoft Corporation | Operating system resource protection |
| US20070186112A1 (en) * | 2005-01-28 | 2007-08-09 | Microsoft Corporation | Controlling execution of computer applications |
| CN101110097A (zh) * | 2007-08-17 | 2008-01-23 | 南京新模式软件集成有限公司 | 一种电子文件安全外发的方法 |
| US20090094673A1 (en) * | 2007-10-07 | 2009-04-09 | Seguin Jean-Marc L | Method and system for integrated securing and managing of virtual machines and virtual appliances |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5966072A (en) | 1996-07-02 | 1999-10-12 | Ab Initio Software Corporation | Executing computations expressed as graphs |
| US6308274B1 (en) * | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Least privilege via restricted tokens |
| US7673323B1 (en) * | 1998-10-28 | 2010-03-02 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
| US6874088B1 (en) * | 1999-10-22 | 2005-03-29 | Mission Critical Linux, Llc | Secure remote servicing of a computer system over a computer network |
| JP4447977B2 (ja) * | 2004-06-30 | 2010-04-07 | 富士通マイクロエレクトロニクス株式会社 | セキュアプロセッサ、およびセキュアプロセッサ用プログラム。 |
| JP4718151B2 (ja) * | 2004-09-24 | 2011-07-06 | 三菱電機株式会社 | 情報処理装置、情報処理方法およびプログラム |
| US7716630B2 (en) | 2005-06-27 | 2010-05-11 | Ab Initio Technology Llc | Managing parameters for graph-based computations |
| US8006088B2 (en) * | 2005-08-18 | 2011-08-23 | Beyondtrust Corporation | Methods and systems for network-based management of application security |
| US8407704B2 (en) * | 2006-09-26 | 2013-03-26 | International Business Machines Corporation | Multi-level memory architecture using data structures for storing access rights and performing address translation |
| US8370957B2 (en) | 2006-12-05 | 2013-02-05 | Samsung Electronics Co., Ltd | Method and apparatus for transmitting contents with limited system permissions |
| JP5112924B2 (ja) * | 2008-03-27 | 2013-01-09 | 株式会社Kddiテクノロジー | アプリケーション移動システム、アプリケーションの移動方法、プログラムおよび携帯端末 |
-
2009
- 2009-12-23 US US12/646,059 patent/US8782429B2/en active Active
-
2010
- 2010-12-21 AU AU2010336503A patent/AU2010336503B2/en active Active
- 2010-12-21 WO PCT/US2010/061517 patent/WO2011079112A1/en not_active Ceased
- 2010-12-21 EP EP10809117.4A patent/EP2517140B1/en active Active
- 2010-12-21 CN CN201080064671.4A patent/CN102770869B/zh active Active
- 2010-12-21 CA CA2784896A patent/CA2784896C/en active Active
- 2010-12-21 KR KR1020127016890A patent/KR101643677B1/ko active Active
- 2010-12-21 KR KR1020157008266A patent/KR101751316B1/ko active Active
- 2010-12-21 JP JP2012546145A patent/JP5797666B2/ja active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1526429A2 (en) * | 2003-10-24 | 2005-04-27 | Microsoft Corporation | Operating system resource protection |
| US20070186112A1 (en) * | 2005-01-28 | 2007-08-09 | Microsoft Corporation | Controlling execution of computer applications |
| CN101110097A (zh) * | 2007-08-17 | 2008-01-23 | 南京新模式软件集成有限公司 | 一种电子文件安全外发的方法 |
| US20090094673A1 (en) * | 2007-10-07 | 2009-04-09 | Seguin Jean-Marc L | Method and system for integrated securing and managing of virtual machines and virtual appliances |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2010336503B2 (en) | 2015-01-15 |
| US20110154051A1 (en) | 2011-06-23 |
| AU2010336503A1 (en) | 2012-06-14 |
| CA2784896C (en) | 2017-06-20 |
| EP2517140A1 (en) | 2012-10-31 |
| EP2517140B1 (en) | 2019-08-14 |
| CN102770869A (zh) | 2012-11-07 |
| CA2784896A1 (en) | 2011-06-30 |
| JP2013516004A (ja) | 2013-05-09 |
| KR101751316B1 (ko) | 2017-06-27 |
| JP5797666B2 (ja) | 2015-10-21 |
| KR20120104271A (ko) | 2012-09-20 |
| US8782429B2 (en) | 2014-07-15 |
| KR101643677B1 (ko) | 2016-08-10 |
| WO2011079112A4 (en) | 2011-08-18 |
| KR20150042298A (ko) | 2015-04-20 |
| WO2011079112A1 (en) | 2011-06-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7356692B2 (en) | Method and system for enforcing access to a computing resource using a licensing attribute certificate | |
| CN105408912B (zh) | 处理认证和资源许可 | |
| US9898587B2 (en) | Software protection using an installation product having an entitlement file | |
| Abdunabi et al. | Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model | |
| JPH10313309A (ja) | 国際暗号法フレームワークでアプリケーションが一定のサービスクラスを合法的に実行することを認証する装置 | |
| KR20230046291A (ko) | 연맹 권한 및 계층적 키 관리를 위한 방법, 장치 및 컴퓨터 판독 가능 매체 | |
| KR20200099041A (ko) | 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법 | |
| CN102770869B (zh) | 计算资源的安全执行 | |
| Nyman et al. | Citizen electronic identities using TPM 2.0 | |
| Parno | Trust extension as a mechanism for secure code execution on commodity computers | |
| Park et al. | CAFE: A virtualization-based approach to protecting sensitive cloud application logic confidentiality | |
| CN119483978B (zh) | 基于可信执行环境的隐私增强方法、装置、设备及介质 | |
| Nwosu | Decentralised Telehealth Data through Blockchain Technology: A ledger between physical and online health services | |
| HK1172112A (en) | Securing execution of computational resources | |
| HK1172112B (en) | Securing execution of computational resources | |
| Wagner | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments | |
| Song et al. | Securing HDF5 Plugins with Digital Signatures | |
| Miriyala et al. | Comparative Review of AWS and Azure Confidential Computing Systems | |
| Jiao | On the Security of Blockchain-based Applications | |
| WO2024256200A1 (en) | Method for improving data security | |
| Carey et al. | Securing Genomic Computations for Research and Clinical Decision Support | |
| CN119515546A (zh) | 一种基于Web3框架的数字资产管控平台、设备及介质 | |
| HK40060449A (en) | Personalized and cryptographically secure access control in operating systems | |
| HK40060449B (en) | Personalized and cryptographically secure access control in operating systems | |
| Wagner | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |